US9124474B2 - Technique for automated MAC address cloning - Google Patents

Technique for automated MAC address cloning Download PDF

Info

Publication number
US9124474B2
US9124474B2 US12/833,296 US83329610A US9124474B2 US 9124474 B2 US9124474 B2 US 9124474B2 US 83329610 A US83329610 A US 83329610A US 9124474 B2 US9124474 B2 US 9124474B2
Authority
US
United States
Prior art keywords
internet protocol
host configuration
dynamic host
interposed
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/833,296
Other versions
US20100274917A1 (en
Inventor
Ali Cherchali
Marius J. Gudelis, Jr.
William G. Lester
Robert J. McLaughlin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property II LP
Original Assignee
AT&T Intellectual Property II LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property II LP filed Critical AT&T Intellectual Property II LP
Priority to US12/833,296 priority Critical patent/US9124474B2/en
Assigned to AT&T INTELLECTUAL PROPERTY II, LLC reassignment AT&T INTELLECTUAL PROPERTY II, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MCLAUGHLIN, ROBERT J, CHERCHALI, ALI, GUDELIS, MARIUS J, JR., LESTER, WILLIAM G
Publication of US20100274917A1 publication Critical patent/US20100274917A1/en
Application granted granted Critical
Publication of US9124474B2 publication Critical patent/US9124474B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L29/12216
    • H04L29/12584
    • H04L29/1282
    • H04L29/12839
    • H04L61/2015
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2596Translation of addresses of the same type other than IP, e.g. translation from MAC to MAC addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/59Network arrangements, protocols or services for addressing or naming using proxies for addressing
    • H04L61/6013
    • H04L61/6022
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Definitions

  • This invention relates to communication over the Internet, and more particularly to establishing IP addresses for subscriber devices.
  • ISPs Internet Service Providers
  • IP device e.g., PC NIC card
  • This request is most commonly made at startup of the IP device, when the device sends a Dynamic Host Configuration Protocol (DHCP) Broadcast Discover message, requesting IP Address offers from any DHCP server that is listening.
  • DHCP Broadcast Discover message requesting IP Address offers from any DHCP server that is listening.
  • DHCP Broadcast Discover message one or more DHCP Offer messages are received at the subscriber's IP device, the IP device chooses the offer of one of the responding servers, and sends a DHCP Request message to the chosen server.
  • the chosen server sends back an Acknowledgement (ACK) message, and communication thereafter proceeds.
  • ACK Acknowledgement
  • Cable companies that offer Internet access through cable modems bridge DHCP Discover messages that are received by a modem onto a Data Over Cable System Interface Specification (DOCSIS) channel, where the cable modem identifies itself to a cable modem termination system (CMTS) by providing its Media Access Control (MAC) address.
  • DOCSIS Data Over Cable System Interface Specification
  • CMTS cable modem termination system
  • MAC Media Access Control
  • the CMTS thus receives both the DHCP Discover message from an IP device that is connected to the cable modem and the cable modem's MAC address.
  • a subscriber's IP device such as a PC, connects to the cable company's ISP server, the cable company can therefore establish a correspondence between the MAC address of the subscriber's cable modem and the MAC address of the subscriber's IP device.
  • a cable company can choose to decline providing an IP address in response to a DHCP Discover message with an unexpected MAC address.
  • Declining to provide an IP address is a measure of security that prevents an interloper's IP device from obtaining service. Consequently, however, when a legitimate subscriber wants to change the IP device or add an interposed device, the subscriber needs to contact the ISP (e.g., by telephone), and have the ISP clear the existing MAC addresses association, so that a new association can be established.
  • An advance in the art is achieved in an arrangement where the device that is known to the ISP is communicating with the ISP through an interposed device that is not known to the ISP by having the interposed device automatically clone the known device's MAC address in its communications with the ISP. This is achieved by the interposed device capturing the MAC address of the known device at startup and employing the captured MAC address in all standard packets that are sent to the ISP.
  • FIG. 1 presents a messages flow chart in accord with the principles disclosed herein;
  • FIG. 2 presents an alternate messages flow chart
  • FIG. 3 shows an arrangement of an interposed device that supports both a PC and an IP telephone.
  • the present disclosure relates to an arrangement where a subscriber's PC (or other IP device) has already been configured to work with the ISP, and where the subscriber interposes a new device between the subscriber's PC and the cable modem.
  • Home Routers (HR), Media Terminal Adapters, and Telephone Adapters are examples of such interposed devices, each possessing its own MAC address.
  • interposed devices have their own MAC addresses
  • an interposed device needs to automatically assume the MAC address of the PC that is already known to the ISP's server whenever the interposed device communicates with the ISP server.
  • the TCP/IP interface of the IP device sends out a DHCP Discover message to acquire an IP address. It is a request to receive an IP address by selecting from one or more DHCP Offer messages that might arrive from listening DHCP servers.
  • the interposed device captures the DHCP Discover message and extracts therefrom the MAC address.
  • the interposed device creates its own DHCP Discover message, places the MAC address that was extracted from the DHCP Discover message sent by the IP device instead of its own MAC address, and in step 13 forwards the modified DHCP Discover message to the ISP.
  • step 14 the ISP sends to the interposed device a DHCP Offer message containing a public IP address and a DNS address
  • step 15 the interposed device sends a DHCP Request message to the ISP, which effectively confirms its acceptance of the offered IP address
  • step 16 the ISP sends an ACK message, confirming the IP address that will be used.
  • communication proceeds between the interposed device and the ISP, with the continued use of the cloned MAC address.
  • the continued use of the cloned MAC address prevents an ISP from raising an alarm should it choose—in the course of the communication session—to check the MAC address of the device with which it is communicating.
  • the interposed device sends a DHCP Offer message to the subscriber's IP device, offering to the IP device a private IP address, and at steps 18 - 19 the interposed device and the IP device complete the IP acquisition protocol vis-à-vis the private IP address in the conventional manner described above.
  • FIG. 2 shows a slightly different approach. Specifically, as soon as the interposed device receives the initial DHCP Discover message in step 21 , in step 22 it immediately offers the subscriber's IP device a private IP address, but with no DNS listed. The offer contains a very short lease time; for example, 10 sec. In step 23 the IP device follows up with the DHCP Request (since this is the only offer it received), and the interposed device completes the transaction with a DHCP ACK message in step 24 .
  • the interposed device then turns to its task of establishing a connection to the ISP, extracts the MAC address of the IP device in step 11 , creates its own DHCP Discover message with its MAC address replaced with the extracted MAC address of the IP device in step 12 , and presents its created DHCP Discover message (with the cloned MAC address) to the ISP in step 13 .
  • the lease time for the private IP address provided to the IP device expires shortly after the interposed device sends its created DHCP Discover message to the ISP.
  • the IP device sends a DHCP Request Renew message to the interposed device, asking to renew the lease. Since the interposed device has not yet received an IP address from the ISP, the interposed device sends a DHCP ACK message to the IP device in step 26 , renewing the lease for another short interval.
  • the communication between the interposed device and the ISP completes, and the interposed device is in possession of a public IP address and DNS address.
  • the interposed device responds in step 28 with a DHCP NACK message that denies use by the IP device of the previously provided private IP address.
  • the subscriber's IP device sends a new DHCP Discover message in step 29 , in response to which in step 30 the interposed device sends a DHCP Offer message that is complete with DNS address(es), and the same or a different private IP address.
  • the IP device then sends a DHCP Request message in step 31 , and the interposed device responds with a DHCP ACK message in step 32 .
  • the interposed device can be viewed to have an upstream side that is connected to the ISP through a modem, and a downstream side that is connected to a subscriber's IP device with a MAC address that is known to the ISP.
  • On the upstream side the interposed device behaves like a client relative to the ISP.
  • On the downstream side the interposed device behaves like a server relative to the subscriber's IP device, and any other device that is connected to the interposed device on the downstream side thereof, such as illustrated for example in FIG. 3 where a PC and a telephone are connected to the downstream side of the interposed device.
  • the telephone shown in FIG. 3 is an IP device.
  • the shown telephone can be a conventional POTS telephone if the circuitry that is necessary for converting it to an IP device is included within the interposed device.
  • the above-disclosed approach requires the PC with the MAC address that is known to the ISP to send a DHCP Discover message to the interposed device before any other of the IP devices that are connected to the downstream side of the interposed device.
  • other devices can send their own DHCP Discover message, obtain their own private IP address from the interposed device and communicate in a conventional manner.
  • the communication with the ISP is with the PC that is known to the ISP because, as shown in step 20 of both FIG. 1 and FIG. 2 , subsequent communication from the interposed device to the ISP is with packets that employ the cloned MAC address.

Abstract

In an arrangement where the device that is known to an ISP is communicating with the ISP through an interposed device that is not known to the ISP, the interposed device captures the known device's MAC address upon startup and clones the captured MAC address in all standard packets that it sends to the ISP.

Description

RELATED APPLICATIONS
This Application is a continuation of application Ser. No. 12/011,751 filed in the USPTO on Jan. 29, 2008, now U.S. Pat. No. 7,787,455, which application is a continuation of U.S. application Ser. No. 11/033,930, filed Jan. 12, 2005, now U.S. Pat. No. 7,342,945, which claims priority of Provisional Ser. No. 60/631,633 filed Nov. 30, 2004.
BACKGROUND
This invention relates to communication over the Internet, and more particularly to establishing IP addresses for subscriber devices.
Internet Service Providers (ISPs) supply a public IP address upon request to a subscriber's IP device (e.g., PC NIC card). This request is most commonly made at startup of the IP device, when the device sends a Dynamic Host Configuration Protocol (DHCP) Broadcast Discover message, requesting IP Address offers from any DHCP server that is listening. In response to the DHCP Broadcast Discover message one or more DHCP Offer messages are received at the subscriber's IP device, the IP device chooses the offer of one of the responding servers, and sends a DHCP Request message to the chosen server. The chosen server sends back an Acknowledgement (ACK) message, and communication thereafter proceeds.
Cable companies that offer Internet access through cable modems bridge DHCP Discover messages that are received by a modem onto a Data Over Cable System Interface Specification (DOCSIS) channel, where the cable modem identifies itself to a cable modem termination system (CMTS) by providing its Media Access Control (MAC) address. The CMTS thus receives both the DHCP Discover message from an IP device that is connected to the cable modem and the cable modem's MAC address. When a subscriber's IP device, such as a PC, connects to the cable company's ISP server, the cable company can therefore establish a correspondence between the MAC address of the subscriber's cable modem and the MAC address of the subscriber's IP device. Thereafter, knowing the MAC address that is expected to be found in DHCP Discover messages coming from the subscriber's cable modem, a cable company can choose to decline providing an IP address in response to a DHCP Discover message with an unexpected MAC address. Declining to provide an IP address is a measure of security that prevents an interloper's IP device from obtaining service. Consequently, however, when a legitimate subscriber wants to change the IP device or add an interposed device, the subscriber needs to contact the ISP (e.g., by telephone), and have the ISP clear the existing MAC addresses association, so that a new association can be established.
The fact that anytime the subscriber wants to add a new IP end-device such as a new PC, a home-router, or some other device, the subscriber needs to contact the ISP represents a significant inconvenience. A solution is to mimic, or clone, the MAC address of the old device in the new end-device, but this also presents a hassle for the subscriber because currently available devices need to be manually configured to perform such cloning.
SUMMARY
An advance in the art is achieved in an arrangement where the device that is known to the ISP is communicating with the ISP through an interposed device that is not known to the ISP by having the interposed device automatically clone the known device's MAC address in its communications with the ISP. This is achieved by the interposed device capturing the MAC address of the known device at startup and employing the captured MAC address in all standard packets that are sent to the ISP.
BRIEF DESCRIPTION OF THE DRAWING
FIG. 1 presents a messages flow chart in accord with the principles disclosed herein;
FIG. 2 presents an alternate messages flow chart; and
FIG. 3 shows an arrangement of an interposed device that supports both a PC and an IP telephone.
DETAILED DESCRIPTION
Many ISPs track a user's MAC address as a crude security measure, but the idea of cloning a MAC address has made this security measure more of a hassle than an effective measure. Home Router manufacturers embraced the idea of cloning in order to keep their buyers from having to reset this MAC with the ISP. However, the subscriber has to locate and identify the MAC address of his or her PC, and use this information to manually set up cloning in the router. To a novice this setup can be challenging, and circumventing it would provide a much better customer experience.
The present disclosure relates to an arrangement where a subscriber's PC (or other IP device) has already been configured to work with the ISP, and where the subscriber interposes a new device between the subscriber's PC and the cable modem. Home Routers (HR), Media Terminal Adapters, and Telephone Adapters are examples of such interposed devices, each possessing its own MAC address.
Although interposed devices have their own MAC addresses, to meet the objective of this invention an interposed device needs to automatically assume the MAC address of the PC that is already known to the ISP's server whenever the interposed device communicates with the ISP server.
In accordance with the illustrative approach depicted in FIG. 1, when the user's IP device is powered on at step 10, the TCP/IP interface of the IP device sends out a DHCP Discover message to acquire an IP address. It is a request to receive an IP address by selecting from one or more DHCP Offer messages that might arrive from listening DHCP servers. In step 11 the interposed device captures the DHCP Discover message and extracts therefrom the MAC address. In step 12 the interposed device creates its own DHCP Discover message, places the MAC address that was extracted from the DHCP Discover message sent by the IP device instead of its own MAC address, and in step 13 forwards the modified DHCP Discover message to the ISP. In step 14 the ISP sends to the interposed device a DHCP Offer message containing a public IP address and a DNS address, in step 15 the interposed device sends a DHCP Request message to the ISP, which effectively confirms its acceptance of the offered IP address, and in step 16 the ISP sends an ACK message, confirming the IP address that will be used. Thereafter, according to step 20 communication proceeds between the interposed device and the ISP, with the continued use of the cloned MAC address. The continued use of the cloned MAC address prevents an ISP from raising an alarm should it choose—in the course of the communication session—to check the MAC address of the device with which it is communicating.
Following step 16, or concurrently therewith, at step 17 the interposed device sends a DHCP Offer message to the subscriber's IP device, offering to the IP device a private IP address, and at steps 18-19 the interposed device and the IP device complete the IP acquisition protocol vis-à-vis the private IP address in the conventional manner described above.
FIG. 2 shows a slightly different approach. Specifically, as soon as the interposed device receives the initial DHCP Discover message in step 21, in step 22 it immediately offers the subscriber's IP device a private IP address, but with no DNS listed. The offer contains a very short lease time; for example, 10 sec. In step 23 the IP device follows up with the DHCP Request (since this is the only offer it received), and the interposed device completes the transaction with a DHCP ACK message in step 24.
The interposed device then turns to its task of establishing a connection to the ISP, extracts the MAC address of the IP device in step 11, creates its own DHCP Discover message with its MAC address replaced with the extracted MAC address of the IP device in step 12, and presents its created DHCP Discover message (with the cloned MAC address) to the ISP in step 13.
In the illustrative signal flow chart of FIG. 2, the lease time for the private IP address provided to the IP device expires shortly after the interposed device sends its created DHCP Discover message to the ISP. When the lease time thus expires, in step 25 the IP device sends a DHCP Request Renew message to the interposed device, asking to renew the lease. Since the interposed device has not yet received an IP address from the ISP, the interposed device sends a DHCP ACK message to the IP device in step 26, renewing the lease for another short interval.
Eventually, the communication between the interposed device and the ISP ( steps 14, 15, and 16) completes, and the interposed device is in possession of a public IP address and DNS address. Thereafter, when the IP address lease of the IP device expires again and the IP device sends a DHCP Request Renew message in step 27, the interposed device responds in step 28 with a DHCP NACK message that denies use by the IP device of the previously provided private IP address. Having received a negative acknowledgement message, the subscriber's IP device sends a new DHCP Discover message in step 29, in response to which in step 30 the interposed device sends a DHCP Offer message that is complete with DNS address(es), and the same or a different private IP address. The IP device then sends a DHCP Request message in step 31, and the interposed device responds with a DHCP ACK message in step 32.
The interposed device can be viewed to have an upstream side that is connected to the ISP through a modem, and a downstream side that is connected to a subscriber's IP device with a MAC address that is known to the ISP. On the upstream side the interposed device behaves like a client relative to the ISP. On the downstream side the interposed device behaves like a server relative to the subscriber's IP device, and any other device that is connected to the interposed device on the downstream side thereof, such as illustrated for example in FIG. 3 where a PC and a telephone are connected to the downstream side of the interposed device. For sake of simplicity, it is assumed that the telephone shown in FIG. 3 is an IP device. Of course, the shown telephone can be a conventional POTS telephone if the circuitry that is necessary for converting it to an IP device is included within the interposed device.
It is noted that the above-disclosed approach requires the PC with the MAC address that is known to the ISP to send a DHCP Discover message to the interposed device before any other of the IP devices that are connected to the downstream side of the interposed device. When this is done, other devices can send their own DHCP Discover message, obtain their own private IP address from the interposed device and communicate in a conventional manner. It is noted, however, that the communication with the ISP, as far as the ISP is concerned, is with the PC that is known to the ISP because, as shown in step 20 of both FIG. 1 and FIG. 2, subsequent communication from the interposed device to the ISP is with packets that employ the cloned MAC address.
The above discloses two illustrative approaches for automatically cloning the MAC address of a device that is known to an ISP, but it should be realized that other approaches can be implemented without departing from the spirit and scope of this invention. To illustrate, the private IP address that is provided to the PC (sans a DNS address) is shown in FIG. 2 to be provided immediately upon receipt DHCP Discover message 21, but it could just as validly be provided sometime later, such as after the MAC address is extracted.

Claims (8)

The invention claimed is:
1. A method, comprising:
obtaining, by an interposed internet protocol device, a media access control address from a user internet protocol device, wherein the media access control address is obtained by receiving a first dynamic host configuration protocol discover message that includes the media access control address from the user internet protocol device, wherein the obtaining further comprises extracting the media access control address from the first dynamic host configuration protocol discover message that is received;
receiving, by the interposed internet protocol device, a first dynamic host configuration protocol request message from the user internet protocol device;
sending, by the interposed internet protocol device, a first dynamic host configuration protocol acknowledgement message to the user internet protocol device;
sending, by the interposed internet protocol device to an internet service provider, a second dynamic host configuration protocol discover message that includes a media access control address from a second user internet protocol device that is different from the media access control address that is extracted from the first dynamic host configuration protocol discover message and is different from a media access control address of the interposed internet protocol device, wherein the media access control address from the second user internet protocol device has previously been extracted by the interposed internet protocol device from a third dynamic host configuration protocol discover message from the second user internet protocol device;
receiving, by the interposed internet protocol device from the internet service provider, a first dynamic host configuration protocol offer message based on the media access control address from the second user internet protocol device, the first dynamic host configuration offer message including a public internet protocol address and a domain name system address;
sending, by the interposed internet protocol device, an interim dynamic host configuration protocol offer message that includes a private internet protocol address, a lease time and a blank domain name service address;
receiving, by the interposed internet protocol device, an interim dynamic host configuration protocol request message from the user internet protocol device in response to the interim dynamic host configuration protocol offer message;
sending, by the interposed internet protocol device, a first interim dynamic host configuration protocol acknowledgement message to the user internet protocol device;
providing, by the interposed internet protocol device, a second dynamic host configuration protocol offer message to the user internet protocol device, wherein the interposed internet protocol device connects to the internet service provider via a cable modem;
sending, by the interposed internet protocol device to the internet service provider, a second dynamic host configuration protocol request message that confirms an acceptance of the public internet protocol address; and
receiving, by the interposed internet protocol device from the internet service provider, a second dynamic host configuration protocol acknowledgement message,
wherein the second dynamic host configuration protocol acknowledgement message that is received from the internet service provider confirms that the internet protocol address will be used by the internet service provider.
2. The method of claim 1, wherein the second dynamic host configuration protocol offer message contains a private internet protocol address and the domain name system address.
3. The method of claim 1 where the interposed internet protocol device is a router.
4. The method of claim 1, where the interposed internet protocol device is a media terminal adapter.
5. The method of claim 1, where the interposed internet protocol device is a telephone adapter.
6. The method of claim 1, further comprising, when the lease time expires prior to the interposed internet protocol device receiving the second dynamic host configuration protocol acknowledgement message:
sending a second interim dynamic host configuration protocol acknowledgement message to the user internet protocol device that provides for a renewed lease time.
7. The method of claim 1, further comprising, when the lease time expires after the interposed internet protocol device receives the second dynamic host configuration protocol acknowledgement message:
sending a dynamic host configuration protocol negative acknowledgment message to the user internet protocol device that denies use of the private internet protocol address that was previously included in the interim dynamic host configuration protocol offer message;
receiving a responsive dynamic host configuration protocol discover message from the user internet protocol device;
sending a final dynamic host configuration protocol offer message to the user internet protocol device;
receiving a responsive dynamic host configuration protocol request message; and
sending a final dynamic host configuration protocol acknowledgement message to the user internet protocol device.
8. The method of claim 1, further comprising:
receiving from the user internet protocol device a dynamic host configuration protocol request-to-renew message when the lease time expires.
US12/833,296 2004-11-30 2010-07-09 Technique for automated MAC address cloning Expired - Fee Related US9124474B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/833,296 US9124474B2 (en) 2004-11-30 2010-07-09 Technique for automated MAC address cloning

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US63163304P 2004-11-30 2004-11-30
US11/033,930 US7342925B2 (en) 2004-11-30 2005-01-12 Technique for automated MAC address cloning
US12/011,751 US7787455B2 (en) 2004-11-30 2008-01-29 Technique for automated MAC address cloning
US12/833,296 US9124474B2 (en) 2004-11-30 2010-07-09 Technique for automated MAC address cloning

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/011,751 Continuation US7787455B2 (en) 2004-11-30 2008-01-29 Technique for automated MAC address cloning

Publications (2)

Publication Number Publication Date
US20100274917A1 US20100274917A1 (en) 2010-10-28
US9124474B2 true US9124474B2 (en) 2015-09-01

Family

ID=36061698

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/033,930 Active 2026-08-24 US7342925B2 (en) 2004-11-30 2005-01-12 Technique for automated MAC address cloning
US12/011,751 Expired - Fee Related US7787455B2 (en) 2004-11-30 2008-01-29 Technique for automated MAC address cloning
US12/833,296 Expired - Fee Related US9124474B2 (en) 2004-11-30 2010-07-09 Technique for automated MAC address cloning

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/033,930 Active 2026-08-24 US7342925B2 (en) 2004-11-30 2005-01-12 Technique for automated MAC address cloning
US12/011,751 Expired - Fee Related US7787455B2 (en) 2004-11-30 2008-01-29 Technique for automated MAC address cloning

Country Status (3)

Country Link
US (3) US7342925B2 (en)
EP (1) EP1662753A1 (en)
CA (1) CA2512131C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150237018A1 (en) * 2014-02-18 2015-08-20 Ciena Corporation Method for securely configuring customer premise equipment

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7342925B2 (en) * 2004-11-30 2008-03-11 At&T Corp. Technique for automated MAC address cloning
US7881289B1 (en) * 2004-12-22 2011-02-01 At&T Intellectual Property Ii, L.P. Method and apparatus for porting telephone numbers of endpoint devices
DE102005006889B4 (en) * 2005-02-15 2007-01-11 Siemens Ag Method, communication arrangement and communication device for establishing a communication relationship in at least one communication network
US8184618B2 (en) * 2005-10-25 2012-05-22 Motorola Solutions, Inc. Methods and apparatus for use in a packet data network
US20080225749A1 (en) * 2007-03-13 2008-09-18 Dennis Peng Auto-configuration of a network device
US10469556B2 (en) * 2007-05-31 2019-11-05 Ooma, Inc. System and method for providing audio cues in operation of a VoIP service
US9225626B2 (en) 2007-06-20 2015-12-29 Ooma, Inc. System and method for providing virtual multiple lines in a communications system
US8056890B2 (en) * 2007-07-02 2011-11-15 William Thomas Engel Cut mat
US8122113B2 (en) * 2007-09-21 2012-02-21 Cisco Technology, Inc. Dynamic host configuration protocol (DHCP) message interception and modification
US20090168755A1 (en) * 2008-01-02 2009-07-02 Dennis Peng Enforcement of privacy in a VoIP system
US8515021B2 (en) * 2008-02-25 2013-08-20 Ooma, Inc. System and method for providing personalized reverse 911 service
US8223631B2 (en) * 2008-05-30 2012-07-17 At&T Intellectual Property I, L.P. Systems and methods to monitor and analyze customer equipment downtime in a voice over internet protocol (VoIP) service network
CA2669193C (en) * 2009-06-16 2014-09-30 Ruggedcom Inc. Discovery and rediscovery protocol method and system
US8504672B2 (en) * 2010-11-19 2013-08-06 Silicon Image, Inc. Discovery of electronic devices in a combined network
FR2983669B1 (en) * 2011-12-05 2014-06-13 Sagemcom Broadband Sas GATEWAY SUITABLE FOR VOD
US20130282523A1 (en) * 2012-04-20 2013-10-24 Howard Pfeffer Network service provider assisted payment fraud detection and mitigation methods and apparatus
US9106706B2 (en) 2012-07-18 2015-08-11 Accedian Networks Inc. Systems and methods of using beacon messages to discover devices across subnets
US8830869B2 (en) 2012-07-18 2014-09-09 Accedian Networks Inc. Systems and methods of detecting and assigning IP addresses to devices with ARP requests
US9735874B2 (en) 2012-07-18 2017-08-15 Accedian Networks Inc. Programmable small form-factor pluggable module
US8751615B2 (en) 2012-07-18 2014-06-10 Accedian Networks Inc. Systems and methods of discovering and controlling devices without explicit addressing
US8862702B2 (en) 2012-07-18 2014-10-14 Accedian Networks Inc. Systems and methods of installing and operating devices without explicit network addresses
US20140071855A1 (en) 2012-09-10 2014-03-13 Accedian Networks Inc. Transparent auto-negotiation of ethernet
CN103034494A (en) * 2012-12-10 2013-04-10 上海斐讯数据通信技术有限公司 Method and device for cloning MAC (Memory Address Counter) address and CPE (Customer Premise Equipment)
JP6142544B2 (en) * 2013-01-22 2017-06-07 富士通株式会社 Setting method, communication system, and communication apparatus
US9560198B2 (en) 2013-09-23 2017-01-31 Ooma, Inc. Identifying and filtering incoming telephone calls to enhance privacy
US9386148B2 (en) 2013-09-23 2016-07-05 Ooma, Inc. Identifying and filtering incoming telephone calls to enhance privacy
US9584470B2 (en) * 2014-02-07 2017-02-28 General Motors Llc Dynamic DHCP for Wi-Fi connectivity in a vehicle
US10769931B2 (en) 2014-05-20 2020-09-08 Ooma, Inc. Network jamming detection and remediation
US10553098B2 (en) 2014-05-20 2020-02-04 Ooma, Inc. Appliance device integration with alarm systems
US9633547B2 (en) 2014-05-20 2017-04-25 Ooma, Inc. Security monitoring and control
US11330100B2 (en) 2014-07-09 2022-05-10 Ooma, Inc. Server based intelligent personal assistant services
JP6347072B2 (en) * 2014-11-21 2018-06-27 富士通株式会社 Registration method, registration apparatus, registration program, and information collection system
US10771396B2 (en) 2015-05-08 2020-09-08 Ooma, Inc. Communications network failure detection and remediation
US10009286B2 (en) 2015-05-08 2018-06-26 Ooma, Inc. Communications hub
US10911368B2 (en) 2015-05-08 2021-02-02 Ooma, Inc. Gateway address spoofing for alternate network utilization
US9521069B2 (en) 2015-05-08 2016-12-13 Ooma, Inc. Managing alternative networks for high quality of service communications
US11171875B2 (en) 2015-05-08 2021-11-09 Ooma, Inc. Systems and methods of communications network failure detection and remediation utilizing link probes
US10116796B2 (en) 2015-10-09 2018-10-30 Ooma, Inc. Real-time communications-based internet advertising
US11703910B2 (en) 2017-09-08 2023-07-18 Realtek Semiconductor Corporation Docking station, electrical device, and method for configuring basic input output system
CN114024899A (en) * 2020-07-17 2022-02-08 艾锐势企业有限责任公司 Router, method for router, computer readable medium and device

Citations (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6223222B1 (en) * 1998-05-14 2001-04-24 3Com Corporation Method and system for providing quality-of-service in a data-over-cable system using configuration protocol messaging
EP1119139A2 (en) 1999-12-30 2001-07-25 Nortel Networks Limited Method and apparatus for providing dynamic host configuration protocol (DHCP) tagging
WO2001071983A1 (en) 2000-03-20 2001-09-27 At & T Corp. Service selection in a shared access network using dynamic host configuration protocol
US20020006137A1 (en) * 2000-05-08 2002-01-17 Rabenko Theodore F. System and method for supporting multiple voice channels
US20020062485A1 (en) * 2000-11-20 2002-05-23 Eiji Okano Cable modem system
US20020141389A1 (en) * 2001-04-03 2002-10-03 Fangman Richard E. System and method for routing IP packets
US6577642B1 (en) * 1999-01-15 2003-06-10 3Com Corporation Method and system for virtual network administration with a data-over cable system
US20030133450A1 (en) * 2002-01-08 2003-07-17 Baum Robert T. Methods and apparatus for determining the port and/or physical location of an IP device and for using that information
US20030147404A1 (en) * 2002-02-05 2003-08-07 Gateway, Inc. System and method for automated network address cloning for routers
US20030147395A1 (en) * 2002-02-06 2003-08-07 Gutknecht Gary Robert Method and apparatus for parameter borrowing for network address translator configuration
US20030172170A1 (en) * 2002-03-08 2003-09-11 Johnson Gerald R. Providing multiple ISP access to devices behind NAT
US20030212781A1 (en) * 2002-05-08 2003-11-13 Hitachi, Ltd. Network topology management system, management apparatus, management method, management program, and storage media that records management program
US20030212773A1 (en) * 2002-05-09 2003-11-13 Gateway, Inc. Transporting a WAN configuration from a PC to a residential gateway
US6657991B1 (en) * 1998-12-21 2003-12-02 3Com Corporation Method and system for provisioning network addresses in a data-over-cable system
US20030233452A1 (en) * 2002-06-13 2003-12-18 Nvidia Corp. Method and apparatus for security protocol and address translation integration
US20040073600A1 (en) 2002-07-08 2004-04-15 Anders Elo Dynamic port configuration of network equipment
US20040177133A1 (en) * 2002-11-12 2004-09-09 Next Generation Broadband Intelligent configuration bridge system and method for adding supplemental capabilities to an existing high speed data infrastructure
US20040205211A1 (en) * 2003-03-11 2004-10-14 Yukiko Takeda Server, terminal control device and terminal authentication method
US20040219948A1 (en) * 2003-04-14 2004-11-04 Jones Bryce A. Multi-mode mobile station and method
US20040230970A1 (en) * 2003-05-15 2004-11-18 Mark Janzen Systems and methods of creating and accessing software simulated computers
US20040249927A1 (en) * 2000-07-17 2004-12-09 David Pezutti Intelligent network providing network access services (INP-NAS)
US20040267949A1 (en) * 2003-06-30 2004-12-30 Rover Jeremy L. System and method for synchronous configuration of DHCP server and router interfaces
US6847704B1 (en) 2002-12-23 2005-01-25 At&T Corp. Self-installable and portable voice telecommunication service
US20050044273A1 (en) * 2003-07-03 2005-02-24 Alcatel Dynamic change of MAC address
US20050047355A1 (en) 1999-09-10 2005-03-03 Keyon Communications, Inc. System and method for providing wireless internet services
US20050083908A1 (en) * 2003-10-15 2005-04-21 Louis Holder Method and apparatus for enhanced Internet telephony
US20050149626A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation XML schema for network device configuration
US20050149204A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation Configuring network settings using portable storage media
US20050198040A1 (en) * 2004-03-04 2005-09-08 Cohen Michael S. Network information management system
US20050198233A1 (en) * 2004-01-07 2005-09-08 Microsoft Corporation Configuring network settings of thin client devices using portable storage media
US20050201391A1 (en) * 2004-03-11 2005-09-15 Hung-Fang Ma Network address translation router and related method
US20050243837A1 (en) 2004-04-28 2005-11-03 Boyd Edward W Method and apparatus for L3-aware switching in an ethernet passive optical network
US7068597B1 (en) 2000-11-27 2006-06-27 3Com Corporation System and method for automatic load balancing in a data-over-cable network
US20060168280A1 (en) * 2002-03-27 2006-07-27 Intel Corporation Pre-execution environment compliant dynamic host configuration protocol relay agent
US7139818B1 (en) 2001-10-04 2006-11-21 Cisco Technology, Inc. Techniques for dynamic host configuration without direct communications between client and server
US7263559B2 (en) * 2002-06-22 2007-08-28 Huawei Technologies Co., Ltd. Method for preventing IP address cheating in dynamic address allocation
US7342925B2 (en) 2004-11-30 2008-03-11 At&T Corp. Technique for automated MAC address cloning
US7508816B1 (en) * 2004-09-01 2009-03-24 Sprint Spectrum L.P. Method and system for making a PSTN call via the internet

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1119138A3 (en) 1999-12-02 2002-05-29 Lucent Technologies Inc. System and method for combining Internet connections with point-to-point telephonic connections

Patent Citations (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6223222B1 (en) * 1998-05-14 2001-04-24 3Com Corporation Method and system for providing quality-of-service in a data-over-cable system using configuration protocol messaging
US6657991B1 (en) * 1998-12-21 2003-12-02 3Com Corporation Method and system for provisioning network addresses in a data-over-cable system
US6577642B1 (en) * 1999-01-15 2003-06-10 3Com Corporation Method and system for virtual network administration with a data-over cable system
US20050047355A1 (en) 1999-09-10 2005-03-03 Keyon Communications, Inc. System and method for providing wireless internet services
EP1119139A2 (en) 1999-12-30 2001-07-25 Nortel Networks Limited Method and apparatus for providing dynamic host configuration protocol (DHCP) tagging
WO2001071983A1 (en) 2000-03-20 2001-09-27 At & T Corp. Service selection in a shared access network using dynamic host configuration protocol
US20020006137A1 (en) * 2000-05-08 2002-01-17 Rabenko Theodore F. System and method for supporting multiple voice channels
US20040249927A1 (en) * 2000-07-17 2004-12-09 David Pezutti Intelligent network providing network access services (INP-NAS)
US20020062485A1 (en) * 2000-11-20 2002-05-23 Eiji Okano Cable modem system
US7068597B1 (en) 2000-11-27 2006-06-27 3Com Corporation System and method for automatic load balancing in a data-over-cable network
US20020141389A1 (en) * 2001-04-03 2002-10-03 Fangman Richard E. System and method for routing IP packets
US7139818B1 (en) 2001-10-04 2006-11-21 Cisco Technology, Inc. Techniques for dynamic host configuration without direct communications between client and server
US20030133450A1 (en) * 2002-01-08 2003-07-17 Baum Robert T. Methods and apparatus for determining the port and/or physical location of an IP device and for using that information
US20030147404A1 (en) * 2002-02-05 2003-08-07 Gateway, Inc. System and method for automated network address cloning for routers
US20030147395A1 (en) * 2002-02-06 2003-08-07 Gutknecht Gary Robert Method and apparatus for parameter borrowing for network address translator configuration
US20030172170A1 (en) * 2002-03-08 2003-09-11 Johnson Gerald R. Providing multiple ISP access to devices behind NAT
US20060168280A1 (en) * 2002-03-27 2006-07-27 Intel Corporation Pre-execution environment compliant dynamic host configuration protocol relay agent
US20030212781A1 (en) * 2002-05-08 2003-11-13 Hitachi, Ltd. Network topology management system, management apparatus, management method, management program, and storage media that records management program
US20030212773A1 (en) * 2002-05-09 2003-11-13 Gateway, Inc. Transporting a WAN configuration from a PC to a residential gateway
US20030233452A1 (en) * 2002-06-13 2003-12-18 Nvidia Corp. Method and apparatus for security protocol and address translation integration
US7143137B2 (en) * 2002-06-13 2006-11-28 Nvidia Corporation Method and apparatus for security protocol and address translation integration
US7263559B2 (en) * 2002-06-22 2007-08-28 Huawei Technologies Co., Ltd. Method for preventing IP address cheating in dynamic address allocation
US20040073600A1 (en) 2002-07-08 2004-04-15 Anders Elo Dynamic port configuration of network equipment
US20040177133A1 (en) * 2002-11-12 2004-09-09 Next Generation Broadband Intelligent configuration bridge system and method for adding supplemental capabilities to an existing high speed data infrastructure
US6847704B1 (en) 2002-12-23 2005-01-25 At&T Corp. Self-installable and portable voice telecommunication service
US20040205211A1 (en) * 2003-03-11 2004-10-14 Yukiko Takeda Server, terminal control device and terminal authentication method
US20040219948A1 (en) * 2003-04-14 2004-11-04 Jones Bryce A. Multi-mode mobile station and method
US20040230970A1 (en) * 2003-05-15 2004-11-18 Mark Janzen Systems and methods of creating and accessing software simulated computers
US20040267949A1 (en) * 2003-06-30 2004-12-30 Rover Jeremy L. System and method for synchronous configuration of DHCP server and router interfaces
US20050044273A1 (en) * 2003-07-03 2005-02-24 Alcatel Dynamic change of MAC address
US20050083908A1 (en) * 2003-10-15 2005-04-21 Louis Holder Method and apparatus for enhanced Internet telephony
US20050149626A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation XML schema for network device configuration
US20050149204A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation Configuring network settings using portable storage media
US20050198233A1 (en) * 2004-01-07 2005-09-08 Microsoft Corporation Configuring network settings of thin client devices using portable storage media
US20050198040A1 (en) * 2004-03-04 2005-09-08 Cohen Michael S. Network information management system
US20050201391A1 (en) * 2004-03-11 2005-09-15 Hung-Fang Ma Network address translation router and related method
US20050243837A1 (en) 2004-04-28 2005-11-03 Boyd Edward W Method and apparatus for L3-aware switching in an ethernet passive optical network
US7508816B1 (en) * 2004-09-01 2009-03-24 Sprint Spectrum L.P. Method and system for making a PSTN call via the internet
US7342925B2 (en) 2004-11-30 2008-03-11 At&T Corp. Technique for automated MAC address cloning
US7787455B2 (en) 2004-11-30 2010-08-31 Ali Cherchali Technique for automated MAC address cloning

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150237018A1 (en) * 2014-02-18 2015-08-20 Ciena Corporation Method for securely configuring customer premise equipment
US10069802B2 (en) * 2014-02-18 2018-09-04 Ciena Corporation Method for securely configuring customer premise equipment

Also Published As

Publication number Publication date
US20080147779A1 (en) 2008-06-19
US20100274917A1 (en) 2010-10-28
EP1662753A1 (en) 2006-05-31
CA2512131C (en) 2009-01-27
US7342925B2 (en) 2008-03-11
US7787455B2 (en) 2010-08-31
CA2512131A1 (en) 2006-05-30
US20060114894A1 (en) 2006-06-01

Similar Documents

Publication Publication Date Title
US9124474B2 (en) Technique for automated MAC address cloning
US6603758B1 (en) System for supporting multiple internet service providers on a single network
CN101296203B (en) Device, system and method for automatically configuring application terminal in family network
EP1876754B1 (en) Method system and server for implementing dhcp address security allocation
US7263559B2 (en) Method for preventing IP address cheating in dynamic address allocation
JP3641128B2 (en) MOBILE COMPUTER DEVICE, MOBILE COMPUTER MANAGEMENT DEVICE, MOBILE COMPUTER MANAGEMENT METHOD, AND COMMUNICATION CONTROL METHOD
EP2919444B1 (en) Method, relay device, and system for acquiring internet protocol address in network
US20080281973A1 (en) Management Method, Device And System For Session Connection
EP1986386B1 (en) A method for binding the address of the user terminal in the access equipment
KR101620479B1 (en) A method and a gateway for providing multiple internet access
WO2018082310A1 (en) Ip address renewal method and apparatus
CN108667672A (en) A kind of automatic adaptation method and router of LAN interface and wan interface
US20030147421A1 (en) Method and apparatus for dynamic host configuration protocol lease time determination
CN101141439A (en) Method and device of reporting user facility access types and distribution network configuration information
CN100362800C (en) A method for triggering user terminal online via data message
US20080086549A1 (en) Ppp access terminal, access service device and a method for getting an address of a provider server by the terminal
JP2005347801A (en) Ip communication system and ip address allocation method
CN103581350A (en) Method, terminals, equipment and system for publishing Internet services across NAT
CN105591848A (en) Authentication method and device of IPv6 stateless automatic configuration
US8289976B2 (en) Method for automatically providing a customer equipment with the correct service
KR20010057104A (en) Internet VPN service provisioning method using service gateway
CN103001930A (en) Remote data communication system
JP4092858B2 (en) Security method and terminal adapter device for internet connection
JP3520904B2 (en) Communication interface device with address resolution function
CN101453529B (en) Method and system for automatic data transmission for tuning dialing rule

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T INTELLECTUAL PROPERTY II, LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCLAUGHLIN, ROBERT J;GUDELIS, MARIUS J, JR.;LESTER, WILLIAM G;AND OTHERS;SIGNING DATES FROM 20100727 TO 20100728;REEL/FRAME:024915/0132

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20230901